Category Archives: Identity

How a Florida school district tames the wild west of education security at scale and on budget

Bringing a central IT focus to large public school systems has always been a challenge, but bringing a security focus to thousands of PCs and devices has been compared to bringing law and order to the Wild West. For the … Continue reading

Posted in big data, Cloud computing, Cyber security, disaster recovery, Enterprise architect, Government, Help desk, Identity, Microsoft, Security, social media | Tagged , , , , , , , , , , , , , | Leave a comment

Women in business leadership — networking their way to success

The next BriefingsDirect digital business insights panel discussion focuses on the evolving role of women in business leadership. We’ll explore how pervasive business networks are impacting relationships and changes in business leadership requirements and opportunities for women. Listen to the … Continue reading

Posted in Ariba, Business networks, Cloud computing, Data center transformation, Enterprise architect, enterprise architecture, Enterprise transformation, ERP, Identity, managed services, Networked economy, Platform 3.0, procurement, professional services, SAP, SAP Ariba, social media, Spot buying, User experience | Tagged , , , , , , , , , , , , | Leave a comment

The next line of defense—How new security leverages virtualization to counter sophisticated threats

When it comes to securing systems and data, the bad guys are constantly upping their games — finding new ways to infiltrate businesses and users. Those who protect systems from these cascading threats must be ever vigilant for new technical … Continue reading

Posted in application transformation, big data, Bitdefender, Citrix, Cloud computing, Cyber security, data analysis, data center, DevOps, Enterprise architect, enterprise architecture, Enterprise transformation, Government, Identity, risk assessment, Security, Virtualization | Tagged , , , , , , , , , , , , | Leave a comment

Experts define new ways to manage supply chain risk in a digital economy

The next BriefingsDirect digital business thought leadership panel discussion explores new ways that companies can gain improved visibility, analytics, and predictive responses to better manage supply chain risk in the digital economy. The panel examines how companies such as Nielsen … Continue reading

Posted in Ariba, big data, Cloud computing, Cyber security, ERP, Identity, Internet of Things, machine learning, Networked economy, procurement, risk assessment, SAP, SAP Ariba, Security, Spot buying | Tagged , , , , , , , , , , , , , | Leave a comment

How SAP Ariba became a first-mover as Blockchain comes to B2B procurement

The next BriefingsDirect digital business thought leadership panel discussion examines the major opportunity from bringing Blockchain technology to business-to-business (B2B) procurement and supply chain management. We will now explore how Blockchain’s unique capabilities can provide comprehensive visibility across global supply … Continue reading

Posted in Ariba, artificial intelligence, Business networks, Cloud computing, Cyber security, enterprise architecture, Enterprise transformation, ERP, Identity, Internet of Things, machine learning, Networked economy, procurement, SAP, SAP Ariba, Security, Spot buying | Tagged , , , , , , , , , , , | Leave a comment

Diversity spend: When doing good leads to doing well

The next BriefingsDirect digital business thought leadership panel discussion focuses on the latest path to gaining improved diversity across inclusive supply chains. The panel examines why companies are seeking to improve supplier diversity, the business and societal benefits, and the new tools and technologies that are making attaining inclusive suppliers easier than ever. Continue reading

Posted in Ariba, Business networks, Cloud computing, Identity, Networked economy, risk assessment, SAP, SAP Ariba, Software, Spot buying, User experience | Tagged , , , , , , , , , , | Leave a comment

Panel tackles how to make mobile devices as secure as they are indispensable

As smartphones have become de rigueur in the global digital economy, users want them to do more work, and businesses want them to be more productive for their employees — as well as powerful added channels to consumers. But neither … Continue reading

Posted in Identity, mobile computing, Security | Tagged , , , , , , , , , , | Leave a comment